-
Notifications
You must be signed in to change notification settings - Fork 4.3k
Update: Authentication Cheat Sheet #1915
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: master
Are you sure you want to change the base?
Conversation
|
|
||
| U2F augments password-based authentication using a hardware token (typically USB) that stores cryptographic authentication keys and uses them for signing. The user can use the same token as a second factor for multiple applications. U2F works with web applications. It provides **protection against phishing** by using the URL of the website to look up the stored authentication key. | ||
|
|
||
| **FIDO2**: FIDO2 and WebAuthn, encompassing previous standards (UAF/U2F), form the foundation of modern **Passkeys** technology. Passkeys enable users to securely log in using their biometric data or device locks, synchronizing across devices, password-free, and phishing-resistant. This technology is widely supported by major platforms. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
"biometric data or device locks" - biometric isn't always included, and I'm not sure what device locks mean. Can this be clarified please?
Also "synchronizing across devices" is not always present IIRC.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Instead of "biometric data or device locks," I changed the term "local user verification," the general security mechanism required by FIDO. This term could be, as you mentioned, face/touch id (biometrics) or your phone or computers PIN (device lock).
"Synchronizing across devices" is not mandatory, but it is a very popular feature. Therefore, I simply say that this feature is generally supported. (Cloud-based credential managers like Apple Keychain provide this synchronization.)
Changed the text to be more clear and understandable.
Thank you! :)
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
CTAP2 is the protocol between the client (browser/OS) and the authenticator, which may be:
- a platform authenticator (Secure Enclave, TPM, Android StrongBox), or
- a roaming hardware authenticator (YubiKey, Feitian, Titan, etc.)
WebAuthn and CTAP2 roles work together:
- WebAuthn is the browser–to–web application API that allows a site to create and use public-key credentials for registration and authentication assertions.
- CTAP2 is the protocol used by the browser/OS to communicate with the cryptographic authenticator (platform or roaming) that performs user verification and signs challenges.
You may want to explicitly mention that together they constitute FIDO2.
The current FIDO section only covers legacy UAF and U2F protocols.
I updated FIDO section to include FIDO2, WebAuthn, and Passkeys. They are commonly used techs nowadays. IMO we should cover in a small section.
Please make sure that for your contribution:
[TEXT](URL)If your PR is related to an issue, please finish your PR text with the following line:
This PR fixes issue #
<REPLACE WITH ISSUE NUMBER>.AI Tool Usage Disclosure (required for all PRs)
Please select one of the following options:
the contents and I affirm the results. The LLM used is
[llm name and version]and the prompt used is
[your prompt here]. [Feel free to add more details if needed]Thank you again for your contribution 😃